CVE-2024-3382

7.5 HIGH

📋 TL;DR

A memory leak vulnerability in Palo Alto Networks PAN-OS software allows attackers to send crafted packets that eventually cause the firewall to stop processing traffic. This affects only PA-5400 Series devices running PAN-OS with SSL Forward Proxy enabled. Successful exploitation leads to denial of service.

💻 Affected Systems

Products:
  • Palo Alto Networks PA-5400 Series firewalls
Versions: PAN-OS versions with SSL Forward Proxy feature enabled
Operating Systems: PAN-OS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when SSL Forward Proxy feature is explicitly enabled on affected hardware.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete firewall outage causing network disruption and loss of security monitoring/protection for all traffic passing through the device.

🟠

Likely Case

Degraded firewall performance leading to intermittent traffic drops and potential security bypass during outage windows.

🟢

If Mitigated

Minimal impact if proper network segmentation and monitoring are in place to detect and respond to anomalous traffic patterns.

🌐 Internet-Facing: HIGH - Firewalls are typically internet-facing and directly exposed to crafted packet attacks.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit if they can reach the firewall management interface.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Attack requires sending crafted packets to the firewall, which is typically network-accessible. No authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific fixed versions

Vendor Advisory: https://security.paloaltonetworks.com/CVE-2024-3382

Restart Required: Yes

Instructions:

1. Check current PAN-OS version. 2. Download and install patched version from Palo Alto support portal. 3. Reboot firewall to apply update. 4. Verify SSL Forward Proxy functionality post-update.

🔧 Temporary Workarounds

Disable SSL Forward Proxy

all

Temporarily disable the vulnerable feature until patching can be completed

Navigate to Device > Certificate Management > SSL Forward Proxy and disable the feature

Implement Rate Limiting

all

Configure traffic shaping rules to limit burst packet rates to the firewall

Configure QoS policies to limit traffic to firewall interfaces

🧯 If You Can't Patch

  • Implement strict network ACLs to limit which sources can send traffic to firewall interfaces
  • Increase monitoring for anomalous traffic patterns and firewall resource utilization

🔍 How to Verify

Check if Vulnerable:

Check if device is PA-5400 Series, SSL Forward Proxy is enabled, and PAN-OS version is vulnerable per vendor advisory

Check Version:

show system info | match version

Verify Fix Applied:

Verify PAN-OS version is updated to patched version and SSL Forward Proxy remains functional

📡 Detection & Monitoring

Log Indicators:

  • High memory utilization alerts
  • Firewall process crashes/restarts
  • Traffic flow interruptions

Network Indicators:

  • Unusual burst traffic patterns to firewall
  • Increased packet drop rates
  • SSL inspection failures

SIEM Query:

source="pan-firewall" (memory_utilization>90 OR process="ssl-proxy" status="failed")

🔗 References

📤 Share & Export